SlideShare a Scribd company logo
Would there be risks associated with an attacker getting a copy of the complete businss system
specifications. Justify your position and provide examples to support your argument.
Solution
Yes, the name is self suggests that he is an attacker which says he might attack many different
confidential information related to the business processing system specification. There may be a
lot of risk when the confidential information of a particular business is spread out side the world
the companies shares property valuable information everything will be in the hands of a third
party who is well known to attack at any time at any place and at the right way once the
companies confidential information is spread outside the company no one can estimate what the
loss will happen in further to that company. Recently a person working in a big MNC spread out
his confidential Company Private information outside the company and you had been fined with
a great penalty.

More Related Content

Similar to Would there be risks associated with an attacker getting a copy of the.docx

Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
larry1401
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Hacker !
Hacker !Hacker !
Hacker !
Mahmoud Saeed
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
Aardwolf Security
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Study the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdfStudy the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdf
babitasingh698417
 
Hackers
HackersHackers
Hackers
Mahmoud Saeed
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
Mahmoud Saeed
 
6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers
Sirius
 
1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
Shamsherkhan36
 
Hacker !
Hacker !Hacker !
Hacker !
Mahmoud Saeed
 
CYBER ATTACK RECOVERY GUIDE
CYBER ATTACK RECOVERY GUIDECYBER ATTACK RECOVERY GUIDE
CYBER ATTACK RECOVERY GUIDE
MUHAMMAD HUZAIFA CHAUDHARY
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
The TNS Group
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be Proactive
Brown Smith Wallace
 
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
North Texas Chapter of the ISSA
 
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
G.S Shaktawat
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
saivarun91
 

Similar to Would there be risks associated with an attacker getting a copy of the.docx (20)

Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Hacker !
Hacker !Hacker !
Hacker !
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Study the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdfStudy the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdf
 
Hackers
HackersHackers
Hackers
 
Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...Hacker word that describes person who have special skills in the field of com...
Hacker word that describes person who have special skills in the field of com...
 
6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers6 Ways to Deceive Cyber Attackers
6 Ways to Deceive Cyber Attackers
 
1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
 
Hacker !
Hacker !Hacker !
Hacker !
 
CYBER ATTACK RECOVERY GUIDE
CYBER ATTACK RECOVERY GUIDECYBER ATTACK RECOVERY GUIDE
CYBER ATTACK RECOVERY GUIDE
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
The Secret Of Hacking Trial Pages
The Secret Of Hacking   Trial PagesThe Secret Of Hacking   Trial Pages
The Secret Of Hacking Trial Pages
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be Proactive
 
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
 
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 

More from richard981

Wilson Corporation is budgeting its equipment needs on an ongoing basi.docx
Wilson Corporation is budgeting its equipment needs on an ongoing basi.docxWilson Corporation is budgeting its equipment needs on an ongoing basi.docx
Wilson Corporation is budgeting its equipment needs on an ongoing basi.docx
richard981
 
Windows hides most of its configuration in a binary file called a regi.docx
Windows hides most of its configuration in a binary file called a regi.docxWindows hides most of its configuration in a binary file called a regi.docx
Windows hides most of its configuration in a binary file called a regi.docx
richard981
 
Wile E- Coyote is dropping from cliff- but having been in this sort of.docx
Wile E- Coyote is dropping from cliff- but having been in this sort of.docxWile E- Coyote is dropping from cliff- but having been in this sort of.docx
Wile E- Coyote is dropping from cliff- but having been in this sort of.docx
richard981
 
Why were the Wall Street analysts willing to believe anything about En.docx
Why were the Wall Street analysts willing to believe anything about En.docxWhy were the Wall Street analysts willing to believe anything about En.docx
Why were the Wall Street analysts willing to believe anything about En.docx
richard981
 
Why the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docx
Why the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docxWhy the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docx
Why the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docx
richard981
 
why the Uniform Commercial Code exists- Is it important-SolutionThe ma.docx
why the Uniform Commercial Code exists- Is it important-SolutionThe ma.docxwhy the Uniform Commercial Code exists- Is it important-SolutionThe ma.docx
why the Uniform Commercial Code exists- Is it important-SolutionThe ma.docx
richard981
 
why the existence of electron trapping sites in a crystalline material.docx
why the existence of electron trapping sites in a crystalline material.docxwhy the existence of electron trapping sites in a crystalline material.docx
why the existence of electron trapping sites in a crystalline material.docx
richard981
 
Why saturated suspended weight is less than dry weight and soaked weig.docx
Why saturated suspended weight is less than dry weight and soaked weig.docxWhy saturated suspended weight is less than dry weight and soaked weig.docx
Why saturated suspended weight is less than dry weight and soaked weig.docx
richard981
 
Why might a small corporation organize as an S corporation- An S corpo.docx
Why might a small corporation organize as an S corporation- An S corpo.docxWhy might a small corporation organize as an S corporation- An S corpo.docx
Why might a small corporation organize as an S corporation- An S corpo.docx
richard981
 
Why might elemental bromine and iodine be more soluble in dicholormeth.docx
Why might elemental bromine and iodine be more soluble in dicholormeth.docxWhy might elemental bromine and iodine be more soluble in dicholormeth.docx
Why might elemental bromine and iodine be more soluble in dicholormeth.docx
richard981
 
Why lack of control got Comcast in trouble-Solutionthe media player is.docx
Why lack of control got Comcast in trouble-Solutionthe media player is.docxWhy lack of control got Comcast in trouble-Solutionthe media player is.docx
Why lack of control got Comcast in trouble-Solutionthe media player is.docx
richard981
 
Why might a company accept a project or investment with an NPV less th.docx
Why might a company accept a project or investment with an NPV less th.docxWhy might a company accept a project or investment with an NPV less th.docx
Why might a company accept a project or investment with an NPV less th.docx
richard981
 
Why is Pluto so small- compared to the gas giants- Pick the one best a.docx
Why is Pluto so small- compared to the gas giants- Pick the one best a.docxWhy is Pluto so small- compared to the gas giants- Pick the one best a.docx
Why is Pluto so small- compared to the gas giants- Pick the one best a.docx
richard981
 
Why is it important to use multiple performance measurements when eval.docx
Why is it important to use multiple performance measurements when eval.docxWhy is it important to use multiple performance measurements when eval.docx
Why is it important to use multiple performance measurements when eval.docx
richard981
 
Why does the absorption spectrum of as semiconductor have a sharp-stee.docx
Why does the absorption spectrum of as semiconductor have a sharp-stee.docxWhy does the absorption spectrum of as semiconductor have a sharp-stee.docx
Why does the absorption spectrum of as semiconductor have a sharp-stee.docx
richard981
 
why is it important to understand culturesSolutionIt important to unde.docx
why is it important to understand culturesSolutionIt important to unde.docxwhy is it important to understand culturesSolutionIt important to unde.docx
why is it important to understand culturesSolutionIt important to unde.docx
richard981
 
Why is goal setting important- What are three benefits- What are three.docx
Why is goal setting important- What are three benefits- What are three.docxWhy is goal setting important- What are three benefits- What are three.docx
Why is goal setting important- What are three benefits- What are three.docx
richard981
 
Why is frequency reuse of 1 possible and what is the number of users p.docx
Why is frequency reuse of 1 possible and what is the number of users p.docxWhy is frequency reuse of 1 possible and what is the number of users p.docx
Why is frequency reuse of 1 possible and what is the number of users p.docx
richard981
 
why EI can not be used in determining protein primary structures-Solut.docx
why EI can not be used in determining protein primary structures-Solut.docxwhy EI can not be used in determining protein primary structures-Solut.docx
why EI can not be used in determining protein primary structures-Solut.docx
richard981
 
Why is anion suppression necessary in ion chromatography-SolutionAnion.docx
Why is anion suppression necessary in ion chromatography-SolutionAnion.docxWhy is anion suppression necessary in ion chromatography-SolutionAnion.docx
Why is anion suppression necessary in ion chromatography-SolutionAnion.docx
richard981
 

More from richard981 (20)

Wilson Corporation is budgeting its equipment needs on an ongoing basi.docx
Wilson Corporation is budgeting its equipment needs on an ongoing basi.docxWilson Corporation is budgeting its equipment needs on an ongoing basi.docx
Wilson Corporation is budgeting its equipment needs on an ongoing basi.docx
 
Windows hides most of its configuration in a binary file called a regi.docx
Windows hides most of its configuration in a binary file called a regi.docxWindows hides most of its configuration in a binary file called a regi.docx
Windows hides most of its configuration in a binary file called a regi.docx
 
Wile E- Coyote is dropping from cliff- but having been in this sort of.docx
Wile E- Coyote is dropping from cliff- but having been in this sort of.docxWile E- Coyote is dropping from cliff- but having been in this sort of.docx
Wile E- Coyote is dropping from cliff- but having been in this sort of.docx
 
Why were the Wall Street analysts willing to believe anything about En.docx
Why were the Wall Street analysts willing to believe anything about En.docxWhy were the Wall Street analysts willing to believe anything about En.docx
Why were the Wall Street analysts willing to believe anything about En.docx
 
Why the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docx
Why the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docxWhy the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docx
Why the Uniform Commercial Code exists- Is it important-SolutionThe ma (1).docx
 
why the Uniform Commercial Code exists- Is it important-SolutionThe ma.docx
why the Uniform Commercial Code exists- Is it important-SolutionThe ma.docxwhy the Uniform Commercial Code exists- Is it important-SolutionThe ma.docx
why the Uniform Commercial Code exists- Is it important-SolutionThe ma.docx
 
why the existence of electron trapping sites in a crystalline material.docx
why the existence of electron trapping sites in a crystalline material.docxwhy the existence of electron trapping sites in a crystalline material.docx
why the existence of electron trapping sites in a crystalline material.docx
 
Why saturated suspended weight is less than dry weight and soaked weig.docx
Why saturated suspended weight is less than dry weight and soaked weig.docxWhy saturated suspended weight is less than dry weight and soaked weig.docx
Why saturated suspended weight is less than dry weight and soaked weig.docx
 
Why might a small corporation organize as an S corporation- An S corpo.docx
Why might a small corporation organize as an S corporation- An S corpo.docxWhy might a small corporation organize as an S corporation- An S corpo.docx
Why might a small corporation organize as an S corporation- An S corpo.docx
 
Why might elemental bromine and iodine be more soluble in dicholormeth.docx
Why might elemental bromine and iodine be more soluble in dicholormeth.docxWhy might elemental bromine and iodine be more soluble in dicholormeth.docx
Why might elemental bromine and iodine be more soluble in dicholormeth.docx
 
Why lack of control got Comcast in trouble-Solutionthe media player is.docx
Why lack of control got Comcast in trouble-Solutionthe media player is.docxWhy lack of control got Comcast in trouble-Solutionthe media player is.docx
Why lack of control got Comcast in trouble-Solutionthe media player is.docx
 
Why might a company accept a project or investment with an NPV less th.docx
Why might a company accept a project or investment with an NPV less th.docxWhy might a company accept a project or investment with an NPV less th.docx
Why might a company accept a project or investment with an NPV less th.docx
 
Why is Pluto so small- compared to the gas giants- Pick the one best a.docx
Why is Pluto so small- compared to the gas giants- Pick the one best a.docxWhy is Pluto so small- compared to the gas giants- Pick the one best a.docx
Why is Pluto so small- compared to the gas giants- Pick the one best a.docx
 
Why is it important to use multiple performance measurements when eval.docx
Why is it important to use multiple performance measurements when eval.docxWhy is it important to use multiple performance measurements when eval.docx
Why is it important to use multiple performance measurements when eval.docx
 
Why does the absorption spectrum of as semiconductor have a sharp-stee.docx
Why does the absorption spectrum of as semiconductor have a sharp-stee.docxWhy does the absorption spectrum of as semiconductor have a sharp-stee.docx
Why does the absorption spectrum of as semiconductor have a sharp-stee.docx
 
why is it important to understand culturesSolutionIt important to unde.docx
why is it important to understand culturesSolutionIt important to unde.docxwhy is it important to understand culturesSolutionIt important to unde.docx
why is it important to understand culturesSolutionIt important to unde.docx
 
Why is goal setting important- What are three benefits- What are three.docx
Why is goal setting important- What are three benefits- What are three.docxWhy is goal setting important- What are three benefits- What are three.docx
Why is goal setting important- What are three benefits- What are three.docx
 
Why is frequency reuse of 1 possible and what is the number of users p.docx
Why is frequency reuse of 1 possible and what is the number of users p.docxWhy is frequency reuse of 1 possible and what is the number of users p.docx
Why is frequency reuse of 1 possible and what is the number of users p.docx
 
why EI can not be used in determining protein primary structures-Solut.docx
why EI can not be used in determining protein primary structures-Solut.docxwhy EI can not be used in determining protein primary structures-Solut.docx
why EI can not be used in determining protein primary structures-Solut.docx
 
Why is anion suppression necessary in ion chromatography-SolutionAnion.docx
Why is anion suppression necessary in ion chromatography-SolutionAnion.docxWhy is anion suppression necessary in ion chromatography-SolutionAnion.docx
Why is anion suppression necessary in ion chromatography-SolutionAnion.docx
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Would there be risks associated with an attacker getting a copy of the.docx

  • 1. Would there be risks associated with an attacker getting a copy of the complete businss system specifications. Justify your position and provide examples to support your argument. Solution Yes, the name is self suggests that he is an attacker which says he might attack many different confidential information related to the business processing system specification. There may be a lot of risk when the confidential information of a particular business is spread out side the world the companies shares property valuable information everything will be in the hands of a third party who is well known to attack at any time at any place and at the right way once the companies confidential information is spread outside the company no one can estimate what the loss will happen in further to that company. Recently a person working in a big MNC spread out his confidential Company Private information outside the company and you had been fined with a great penalty.